CyberoamPresentation

88
www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Rese Comprehensive Network Security Our Products Unified Threat Management Cyberoam Central Console (CCC) SSL VPN Data Protection & Encryption Device Management Application Control Asset Management Cyberoam – Endpoint Data Protection Comprehensive Network Security CYBEROAM

Transcript of CyberoamPresentation

Page 1: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Our Products

Unified Threat Management Cyberoam Central Console (CCC) SSL VPN

Data Protection & Encryption

Device Management

Application Control

Asset Management

Cyberoam – Endpoint Data Protection

Comprehensive Network Security

CYBEROAM

Page 2: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Agenda of PresentationAgenda of Presentation

About Elitecore Technologies Cyberoam USP UTM Cyberoam Credentials/ Awards/ Accréditations

Page 3: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Established in 1999 400+ Employees ISO 9001:2000 certified company Backed by  World’s Largest Private Equity Group ($90bn)

Sales, Distribution Channel & Customers across 75+ countries Communication - Networks – Security

- Cyberoam - Network to Endpoint Security- CRESTEL - Telecommunication OSS BSS- EliteAAA - Telecommunication - 24online - Bandwidth Management Solution

About Elitecore TechnologiesAbout Elitecore Technologies

Page 4: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Page 5: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Internal threats Identity theft Data loss Data deletion Data modification

External threats Worms Malicious code Virus Malware

Social Engineeringthreats

Spam Phishing Pharming

Data theft DoS attacks Hacking

USER

Attack on Organization

User – The Weakest Security Link

Page 6: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Page 7: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Layer 8 Technology – Security around the User- Network security decisions based on Usernames and

IP Addresses Control Who is doing What in the network Allows creation of User Identity-based security policies Identifies traffic by username even in case of dynamic IP

Layer 8 – The Human LayerLayer 8 – The Human Layer

indicates a feature unique to Cyberoam

Page 8: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

UserUser

Page 9: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam’s Layer 8 Technology adds SPEED to security- Offers instant visibility into source of attacks- Identifies attackers/victims with usernames- Allows immediate remediation to restore security or enables

proactive security- Quickly and easily configure and manage policies based on

users

Layer 8 – The Human LayerLayer 8 – The Human Layer

Page 10: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam UTM- Identity-based Security

Integrated security over single platform

Layer 8 penetrates through each security module

Page 11: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Security Connectivity Productivity

Organizational Concerns

Network security

Content Security

Administrative Security

Business Continuity

Network Availability

Future-ready connectivity

Employee productivityIT resource optimizationAdministrator productivity

Page 12: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam UTM solves Organizational Concerns

Page 13: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam Product walk thru

Page 14: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CYBEROAM ASSURES SECURITY

Network Security Content Security Administrative Security

Firewall IPS Wireless security

Anti-Malware Anti-Spam HTTPS Content

security

Next-Gen UI iView- Logging &

Reporting

Page 15: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Stateful Inspection Firewall (Fusion Technology)

SECURITY » Network Security » Firewall

- Interface for achieving Unified Security Identity-based policies enable security,

connectivity, productivity

Page 16: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Other UTMs

User Login

Cyberoam Authenticates

• User• IP Address• MAC Id• Session Id

Cyberoam Authorizes

• Access Time • Internet Quota• Security Policies• Web Filtering• Layer 7 Controls• QoS• IM Controls

Cyberoam Audits

• Identity - based Logs + Reports

• MAC Id• Session Id

Cyberoam Layer 8 Advantage

Page 17: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Identity

+

Security

+

Connectivity

+

Productivity

Page 18: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IP Less Identity- Layer-8 Identity over Thin Client / Terminal Server- Windows Terminal Server- Citrix XenServer- All user based policies to terminal servers- Not limited to just Content Filtering- Authenticates and filters all TCP applications

SECURITY » Content Security » Anti-Malware

Terminal Server

XenServer

Page 19: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Intrusion Prevention System- Cyberoam IPS + Layer 8 Technology

Identity-based IPS policies per user or group Identity-based alerts and reports

- Visibility into applications usage - User, Source, Destination, Usage

- Overview of threat status - Top alerts, top attackers, top victims

3500+ signatures – broadest security cover Internet Threat Response Team Allows multiple IPS policies

SECURITY » Network Security » IPS

Page 20: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

(Alex)

(Alex)

(Nancy)

(Nancy)

Page 21: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Wireless (WLAN) Security- High performance, integrated

security over WLAN Secures wireless networks to

the extent of wired networks

- Supports 802.11n wireless standard

- Multiple Virtual Access Points- Layer 8 over WLAN

Identity-based policies in dynamic IP environment

MAC-based filtering Supports IP-address pool

- Enhances security

SECURITY » Network Security » Wireless security

Page 22: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Gateway Anti-Malware - 4 million+ signatures- Bi-directional scanning of web & email- Self-service Virus Quarantine- Reduced window of vulnerability

Broadest security cover against all malware

- Scans HTTP, FTP, SMTP, POP3 HTTPS, IMAP Instant Messenger traffic

- Layer 8 Impact Identity-based virus reports

- Instant visibility into attacker/victim Identity-based Quarantine policies

SECURITY » Content Security » Anti-Malware

indicates feature offered only by top-rated UTMs

Anti-Virus

Anti-Spyware

Page 23: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SECURITY » Content Security » Anti-Spam

Gateway Anti-Spam- IP Reputation Filtering

Blocks 85% of incoming messages at gateway- Saves bandwidth

- Near 98% spam detection- False Positive rate of 1 in a million

Reduces fear of losing business emails

- Self-Service quarantine area- User-based Spam Digest

Frees administrator time & management- Manage Email recipients

Data leakage prevention and archiving

Premium

Page 24: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Scanning with Recurrent Pattern Detection (RPD) technology Content-agnostic, multi-language security against all spam types

viz. pdf, excel, mp3

SECURITY » Content Security » Anti-Spam

- Virus Outbreak Detection (VOD) for zero-hour protection- Scans SMTP, POP3, IMAP traffic

Page 25: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SECURITY » Content Security » Anti-Spam

- RPD Technology- Most outbreaks last only a few hours- Cyberoam identifies outbreaks real-time- Signature-based Anti-Spam take time to release signatures

- Users remain unprotected till Anti-Spam is updated - Too late to battle out the initial peak of attack

Page 26: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Email Management:

Page 27: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

HTTPS/SSL Content Security- Scans SSL traffic for virus & malware- Controls File upload over SSL- Reports files uploaded via SSL- Stops HTTPS/SSL as a medium for

Data Leakage Malware Propagation

SECURITY » Content Security » HTTPS Content Security

indicates feature offered only by top-rated UTMs

Page 28: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Next-Gen UI- Web 2.0 technology advantages- Easy navigation, custom controls, intuitive interface

Fewer security errors - Increases security Enhances administrative productivity Shorter learning curves

- Unified Security Rules for all security features from firewall page

SECURITY » Administrative Security » Next-Gen UI

Page 29: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam iView – On-Appliance Logging & Reporting- Ability to log and report activities- LAYER 8 - Identity-based logging and reporting –

Pinpoints the user- Security Management

iView dashboard- Shows network attacks on single screen Drill-down reports – 3rd level drill-down for attack details 1000+ Reports

- Log Management- Compliance Management

HIPAA, PCI DSS, GLBA, and more

- Forensic Analysis

SECURITY » Administrative Security » iView- Logging & Reporting

Page 30: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam iView’s Logging & Reporting Facilitates Security, Compliance, Forensics

Logs & Events

Identity

Logging Reporting

ComplianceManagement

ForensicAnalysis

Data Protection

Security Management

Page 31: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

User Dashboard

Page 32: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Combined Report

Page 33: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Attacks

Page 34: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Denied Categories

Page 35: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Categories

Page 36: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Web Users

Page 37: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Search Engine – Google Search Results

Page 38: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Top Spam Recipients

Page 39: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CYBEROAM ASSURES CONNECTIVITY

Business Continuity Network Availability Future-ready connectivity

Multiple Link Management

High Availability

VPN 3G/WiMAX

modem support

IPv6

Page 40: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Multi-Link Management- Automated Load balancing assures ROI/investment

Support for more than 2 ISP links Supports Wireless WAN (3G USB modems, Wimax)

CONNECTIVITY » Business Continuity » Multiple Link Management

- Link Failover Supports multiple failover conditions Monitors link availability of multiple WAN connections Transfers traffic from a failed link to a working link

- Maximizes business up-time- Optimizes link utilization for business continuity

Active-Active Auto Link Failover Active-Passive Auto Link Failover Support for more than 2+ ISP links Supports WWAN for failover

Page 41: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Layer 8 Policy-based Routing

Routes traffic based on:- Source IP addresses - Protocols- Users

Assures Quality of Service for key users and applications

CONNECTIVITY » Business Continuity » Multiple Link Management

Page 42: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Active-Active gateway load balancing

Sales Dept. Finance Dept.Dev. Dept.

Failover Link

ISP1 (MPLS)(10 mbps)

ISP2 (ADSL)(5 mbps)

ISP3 (3G)(1 mbps)

Page 43: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Policy Based Routing

Page 44: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

ICSA Labs Certified High Availability- Supports

• Active – Active• Active - Passive

- Maximizes network uptime - Reduces single-point-of-failure - Ensures continuous Cyberoam security- Ensures business continuity

CONNECTIVITY » Business Continuity » High Availability

Page 45: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Virtual Private Network (VPN) - Anywhere, any device secure remote connectivity- Supports

IPSec, L2TP, PPTP technologies SSL-VPN

- Client-type independent Web access mode- Application access mode- Client mode

Threat Free Tunneling (TFT) Technology Scans traffic entering VPN tunnel for:

- Malware- Spam- Inappropriate content - Intrusion attempts

- Maintains secure endpoint and network environments

CONNECTIVITY » Network Availability » VPN

Page 46: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SSL VPN User Portal

Page 47: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SSL VPN User Portal

Page 48: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IPv6 (Future Ready Connectivity) ‘IPv6 Ready’ gold logo

- Cyberoam identifies and processes IPv6 traffic

Third-party validation- International Testing Program with

3000+ rigorous test cases IPv6 compliance to become

mandatory in government and other enterprises

- Driven by diplomatic initiatives

CONNECTIVITY » Future-ready connectivity » IPv6

IPV4

Page 49: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CYBEROAM ASSURES PRODUCTIVITY

Employee Productivity

IT Resource Optimization

Content Filtering IM controls

Bandwidth Management

Traffic Discovery Layer 7

Administrator Productivity

Next-Gen UI

Page 50: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Content Filtering

- Industry’s most comprehensive URL database

82+ categories 44 million+ URLs

- On-appliance web category database Faster access Surfing pattern privacy

- Controls access to HTTP & HTTPS hosted websites

Increases productivity

Productivity » Employee Productivity » Content Filtering

Premium

Page 51: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

- Controls that are difficult to bypass

Filters Web 2.0 content Blocks Google cache pages Search keyword reports Blocks embedded URLs Detects/Blocks Third Party Proxy

and Tunneling software- Controls Data Leakage

Blocks files from uploading to web pages

Blocks file transfer through Instant Messengers

Productivity » Employee Productivity » Content Filtering

Premium

Page 52: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Web Categories (82+)

Page 53: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Identity Based PoliciesIdentity Based Policies

Page 54: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Control who can chat with whom

Archive Communication

Control communication medium(chat, video, voice, file transfer)

Data Protection

Productivity

Instant Messaging & Control

Productivity / Employee Productivity / IM controls

Page 55: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IM Controls- Identity-based controls for Yahoo messenger and Windows Live

Messenger- Scans malware- Logs and controls

Access Conversation File transfer Voice/Webcam

Productivity » Employee Productivity » IM controls

Page 56: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IM Controls for Yahoo MSG:

Data Leak Protection (File Transfer Control)Who can chat with whom!Logging of Chat Conversations

Page 57: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IM Controls for MSN & Windows Messenger:

Logging of Chat ConversationsWho can chat with whom!Logging of Chat Conversations

Page 58: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Data Loss Prevention regular expression (RegEx):- Detect specific data including:

- Social Security Numbers (SSN)- Credit Card Numbers (CCN)- ABN Routing Numbers

Page 59: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

IM Audit Logs:

Page 60: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Best of Breed Bandwidth Management/QoS

- Application and Identity-based bandwidth allocation- Category wise Bandwidth management- Restrict Bandwidth usage for a combination of source,

destination and service/service group - Schedule-based bandwidth allocation- Committed and burstable bandwidth

Productivity » IT Resource Optimization » Bandwidth Management

Page 61: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Application based bandwidth management:

Page 62: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Traffic Discovery- Real-time visibility into bandwidth utilization by user,

protocol, application- Provides visibility of unproductive usage of resources

and threat incidence

Productivity » IT Resource Optimization » Traffic Discovery

Page 63: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Traffic Discovery:

Live Traffic Analysis including Bandwidth, Data Transfer Connection InformationLive traffic filtering by Application, User, IP AddressFilter traffic for specific applicationTraffic Filtering by Firewall Rule-ID, IP Address, Port etc.

Page 64: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Layer 7- Offers visibility and management over Application Layer 7

- Allows control over

• Who (User)

• When (Time)

• What (Application)

• How (Bandwidth) Essential for Cloud Computing

- Assures availability of business-critical applications

- Controls bandwidth costs

Productivity » IT Resource Optimization » Layer 7

Page 65: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CRM ERPSalesforce

YouTubeIM

ApplicationWebmail

CasualTraffic

Application Firewall Crowd of Applications Bandwidth Management

Cyberoam Application Firewall

Page 66: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

CRM

ERP

Salesforce

YouTube

IM Application

Webmail

CasualTraffic

Application Firewall Crowd of Applications Bandwidth Management

Page 67: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Identity based Technology - The Reason

Username / IP AddressApplication Based Control.

Controls over 5000+ Applications

Page 68: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Summary

Page 69: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Human Approach

• Numbers – Hard & Boring to remember! 192.168.1.2

172.16.13.123

10.12.111.213

Names - Used daily!!!19

2.16

8.10

.122

172.

17.1

2.12

3

10.1

2.11

.23

192.168.11.21172.16.13.12310.12.111.213

192.168.10.122172.17.12.123

10.12.11.23

John

Lisa

AngelinaCarlPatricStefan SophiePam

AlbertCamileS

imon

Mic

hael

Chr

is

TonyMegan

Page 70: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Extensible Security Architecture (ESA)

- Ability to adapt to future security needs- Ability to support feature enhancements in future - Ready for future upgrades Vs ASIC

Cyberoam ArchitectureCyberoam Architecture

Multi-core Technology- Multi-core processors

Parallel processing of Cyberoam security features

- Real-time, Unified Security Higher Throughputs

- High-speed memory access to signatures Security against advanced threats

Page 71: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam Credentials

Page 72: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“IDC believes that identity-based UTM represents the next generation in the burgeoning UTM marketplace. When enterprises realize the value of having identity as a full component of their UTM solution the increased internal security, protection against insidious and complex attacks, understanding individual network usage patterns, and compliance reporting - Cyberoam will benefit as the innovator.”

Source: Unified Threat Management Appliances and Identity-Based Security: The Next Level in Network Security, IDC Vendor Spotlight

IDC ReviewIDC Review

Page 73: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam ranks 5th in“Completeness of Vision”

Gartner ranks Cyberoam as a “Visionary” in July 2009 Magic Quadrant for SMB Multifunction FirewallsGartner ranks Cyberoam as a “Visionary” in July 2009 Magic Quadrant for SMB Multifunction Firewalls

FortinetSonicwall

WatchGuard

Astaro

Cyberoam

Page 74: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Astaro x

Checkpoint x

Cisco x

Cyberoam x

eSoft

Fortinet x

IBM x

NetAsq x

Secure Computing x

Sonicwall x

StillSecure x

Untangle x

Watchguard x

Strong Positive

RATING

Strong Negative

Caution Promising Positive

Gartner Market Scope (Q2 2008) SMB Multifunction FirewallsGartner Market Scope (Q2 2008) SMB Multifunction Firewalls

Page 75: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

2008 - Emerging Vendor of the Year2008 - Emerging Vendor of the Year

Cyberoam has been awarded the 2008 Asia Pacific Frost & Sullivan Emerging Company of the Year

Award in the Network Security Market

Page 76: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam CertificationsCyberoam Certifications

Anti-Virus Anti-Spyware Anti-Spam URL Filtering Firewall VPN IPS/IDP

UTM Level 5: Cyberoam holds a unique & complete UTM certification

ICSA Certified Firewall

VPNC Certified for Basic VPN & AES Interoperability

ICSA Certified High-Availability

PremiumPremium

Page 77: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

SC Magazine Five Star Rating – Five Times in a Row!SC Magazine Five Star Rating – Five Times in a Row!

April 2009 – Product review Cyberoam CR200i A lot of functionality, including good integration support, in a single easy-to-use appliance” also includes a solid web content filter and blocking for applications such as IM and P2P“

December 2008 – Product review Cyberoam CR100i“Cyberoam delivers a wealth of features for the price, which include versatile identity- and policy-based security measures ”

March 2008 – UTM Roundup Cyberoam CR1000i “Fully loaded, with many great features” “packs a more serious punch” “can restrict or open internet access by bandwidth usage, surf time or data transfer”.

July 2007 – UTM Roundup Cyberoam CR250i “console is well organized and intuitive to navigate” “flexible and very powerful” “this appliance is a good value for almost any size environment”.

Page 78: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Best Integrated SecurityAppliance Best Security Solution forEducation Best Unified Security

Tomorrow’s TechnologyToday 2007

2007, 2008 FinalistNetwork MiddleEast Award2008 Finalist ChannelMiddle East Award

VAR Editor’s Choice for Best UTM (2007)

Finalist - 2008 GlobalExcellence inNetwork SecuritySolution

ZDNET Asia- IT Leader Of the Year 2008

2008 Emerging Vendor of the Year for Network Security

SMB Product of the Year

2008 – Best Content Filtering

AwardsAwards

Page 79: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Partial ClientelePartial Clientele

Page 80: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Partial ClientelePartial Clientele

Page 81: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam maximizes Return Over Investment. We are fully satisfied with Cyberoam Unified Threat Management solution.” Mr. Avnesh JainSr. Manager, Information SystemsHero Honda Motors Limited

TestimonialsTestimonials

“Since its deployment, unlike FortiGate, Cyberoam has been able to give wire speed performance. We soon plan to invest more in Cyberoam appliances to protect our other operations. The most important quality of Cyberoam is its unobtrusive businessfriendly wire-speed security. Cyberoam All-in-One solution is running very well and can change people’s mind about the performance of UTM solutions” Mr. Vo Remy Manager, IT Department, Societe Generale Viet Finance, Vietnam

Page 82: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“We purchased few appliances to start with and monitored them. We soon came to a conclusion that Cyberoam UTM was a robust appliance and that the post-sales support is prompt. VisionTech Systems, Cyberoam’s channel partners ensures that we have continuous support. Today, after purchasing twenty appliances from them, our opinion about them still remains unchanged. We intend to continue deploying Cyberoam UTM appliances on our other constructions sites in future.”

TestimonialsTestimonials

“Through Cyberoam we have gained in efficiency, quality control and now we focus on users rather than IP addresses, which is more logical when addressing security concerns. We actually got what we were promised on paper. The security policies have been easy to configure” Mr.Thierry ManginDirectro of Information Systems, Baccarat Crystal, France

Page 83: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

“We find Cyberoam UTM a dependable solution. It amply takes care of our primary productivity need. En route, it also bridges security our to productivity requirements. Cyberoam is productivity promoting, business friendly security” Mr.Leonides Tolentino, Sr. Manager, MISCDO-Foodsphere, Philippines

TestimonialsTestimonials

“The Cyberoam team has set an extremely high bar for vendors that I deal with on all levels of business. The responsiveness, impeccable follow-up and willingness to adjust as dynamically as our requests was uncanny. Cyberoam’s customer service should be a model. From sales to support, I could not ask for a more desirable experience. The product’s power matches the providers experience and support. Stellar! Five Star! Speechless! ” Mr. Courtney SwanagainIBusiness Strategist,Swanagain Elite Enterprises, USA

Page 84: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Cyberoam CRi UTM Appliance Range

Large Enterprises- CR 1500i- CR 1000i- CR 500ia

Small to Medium Enterprises- CR 300i- CR 200i- CR 100ia- CR 50ia

Remote Offices- CR 35ia- CR 25ia- CR 15i- CR 15wi

Page 85: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Identity-based Firewall VPN Free SSL-VPN Bandwidth Management Multiple Link Management On Appliance Reporting Basic Anti-Spam (RBL

Service)

Basic ApplianceBasic Appliance Bundled SubscriptionsBundled Subscriptions

Gateway Anti-Virus Subscription (Anti-malware, phishing, spyware protection included)

Gateway Anti-spam Subscription Web & Application Filtering

Subscription Intrusion Prevention System (IPS) 24 x 7 Tech Support & Warranty

Subscription Model

Page 86: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Bundled SubscriptionsBundled Subscriptions

TVS (Total Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)- Gateway Anti-spam- Web & Application Filtering- Intrusion Prevention System (IPS)- 8 x 5 Email, phone and chat Tech Support

SVS (Security Value Subscription)- Gateway Anti-Virus (Anti-malware, phishing, spyware protection included)- Web & Application Filtering- Intrusion Prevention System (IPS)- 8 x 5 Email, phone and chat Tech Support

Subscription services are available on 1 Year, 2 Year or 3 Year subscription basis

Page 87: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Question/Answer Session

Page 88: CyberoamPresentation

www.cyberoam.com © Copyright 2010 Elitecore Technologies Ltd. All Rights Reserved.

Comprehensive Network Security

Thank you!